General

  • Target

    155a6678c4527a5d29acb6acbe3136601f002d7b89d264ff40c5652ea8c58271

  • Size

    92KB

  • Sample

    220212-e1p6mshedl

  • MD5

    d3e9c51845245631be7750878f3756b9

  • SHA1

    167db640ab76dec6b59be62edd432127e0023533

  • SHA256

    155a6678c4527a5d29acb6acbe3136601f002d7b89d264ff40c5652ea8c58271

  • SHA512

    2476bc7d3740e3067ed35989b753e0da969ec2a8fc3fc0d3078141e31179266ed18869ce237d8c3155c040347026182ae2ca79b4fbc08689813ca0474ff204ae

Malware Config

Targets

    • Target

      155a6678c4527a5d29acb6acbe3136601f002d7b89d264ff40c5652ea8c58271

    • Size

      92KB

    • MD5

      d3e9c51845245631be7750878f3756b9

    • SHA1

      167db640ab76dec6b59be62edd432127e0023533

    • SHA256

      155a6678c4527a5d29acb6acbe3136601f002d7b89d264ff40c5652ea8c58271

    • SHA512

      2476bc7d3740e3067ed35989b753e0da969ec2a8fc3fc0d3078141e31179266ed18869ce237d8c3155c040347026182ae2ca79b4fbc08689813ca0474ff204ae

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks